Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference54 articles.
1. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39
2. Zhang YD, Tang S, Li JT (2007) Secure and incidental distortion tolerant digital signature for image authentication. J Comput Sci Technol 22(4):618–625
3. El Bakrawy LM, Ghali NI, ella Hassanien A, Kim Th (2011) A rough k-means fragile watermarking approach for image authentication. In: 2011 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 19–23. IEEE
4. Zhang H, Wang C, Zhou X (2017) Fragile watermarking based on lbp for blind tamper detection in images. Journal of Information Processing Systems 13(2):385–399
5. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile water marking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470